There’s been a steady drumbeat of credential stealing attacks lately so I’m hoping to get practical recommendations for how to deal with it. Obviously “just don’t install malicious code” isn’t a reliable defense.
yjftsjthsd-h•28m ago
Firejail is certainly one option. Supposedly bubblewrap is more secure, but it's much lower level. The bubblejail project tries to bridge that gap, but isn't packaged for many distros. That said, even raw bubblewrap can work if you don't mind writing wrappers yourself.
For persistent system/user services you can just run things in systemd and then use its containment options to limit what they can access. It's reasonably doable to specify a service that can only see its own directories and has no extra permissions.
You can also run things in containers. If a program is running inside of podman/docker and it only has access to limited directories being mapped in, then the blast radius is pretty finite even if it runs malicious code.
janalsncm•39m ago
yjftsjthsd-h•28m ago
For persistent system/user services you can just run things in systemd and then use its containment options to limit what they can access. It's reasonably doable to specify a service that can only see its own directories and has no extra permissions.
You can also run things in containers. If a program is running inside of podman/docker and it only has access to limited directories being mapped in, then the blast radius is pretty finite even if it runs malicious code.